In this thesis, the author hypothesizes that the use of computationally intensive mathematical operations in password authentication protocols can lead to security vulnerabilities in those protocols. In order to test this hypothesis: 1. A generalized algorithm for cryptanalysis was formulated to perform a clogging attack (a formof denial of service) on protocols that use computationally intensive modular exponentiation to guarantee security. 2. This technique was then applied to cryptanalyze four recent password authentication protocols, to determine their susceptibility to the clogging attack. The protocols analyzed in this thesis differ in their usage of factors (smart cards, memory drives, etc.) or their method of communication (encrypti...
AbstractThe security of a password authentication scheme using smart cards proposed by Liao et al. [...
Leakage-resilient cryptography tries to design algorithms that are provably secure against side-chan...
A fundamental problem in security is authentication: namely, how to verify the identity of another p...
In this work, we argue that the usage of computationally intensive mathematical operations in passwo...
Elliptic curve cryptography (ECC) is extensively used in various multifactor authentication protocol...
Abstract. In this work we consider two protocols for performing crypt-analysis and security enhancem...
International audiencePasswords are still the most widespread means for authenticating users, even t...
In this work we consider two protocols for performing cryptanalysis and security enhancement. The fi...
International audiencePasswords are still the most widespread means for authenticating users, even t...
Authentication is one of the essentials components of information security. It has become one of the...
peer-reviewedThe rapid development of information and network technologies motivates the emergence o...
Abstract—In this paper we study a scheme for making cryptanalysis and security improvement. This pro...
We provide identification protocols that are secure even when the adversary can reset the internal s...
The application of machine learning in the security analysis of authentication and key agreement pro...
Authentication is one of the essentials components of information security. It has become one of the...
AbstractThe security of a password authentication scheme using smart cards proposed by Liao et al. [...
Leakage-resilient cryptography tries to design algorithms that are provably secure against side-chan...
A fundamental problem in security is authentication: namely, how to verify the identity of another p...
In this work, we argue that the usage of computationally intensive mathematical operations in passwo...
Elliptic curve cryptography (ECC) is extensively used in various multifactor authentication protocol...
Abstract. In this work we consider two protocols for performing crypt-analysis and security enhancem...
International audiencePasswords are still the most widespread means for authenticating users, even t...
In this work we consider two protocols for performing cryptanalysis and security enhancement. The fi...
International audiencePasswords are still the most widespread means for authenticating users, even t...
Authentication is one of the essentials components of information security. It has become one of the...
peer-reviewedThe rapid development of information and network technologies motivates the emergence o...
Abstract—In this paper we study a scheme for making cryptanalysis and security improvement. This pro...
We provide identification protocols that are secure even when the adversary can reset the internal s...
The application of machine learning in the security analysis of authentication and key agreement pro...
Authentication is one of the essentials components of information security. It has become one of the...
AbstractThe security of a password authentication scheme using smart cards proposed by Liao et al. [...
Leakage-resilient cryptography tries to design algorithms that are provably secure against side-chan...
A fundamental problem in security is authentication: namely, how to verify the identity of another p...